General

  • Target

    f48ac20973b5932872ff416d6a5a195129844f310ba6ee761e932f5f8510aad0.zip

  • Size

    172KB

  • Sample

    250327-xd894swxfs

  • MD5

    c756850e99d98fa0d2253a6a0ee61cc6

  • SHA1

    5adfbd1e7bd47171a7cc55e6836603096183c56d

  • SHA256

    f48ac20973b5932872ff416d6a5a195129844f310ba6ee761e932f5f8510aad0

  • SHA512

    ff03e1d6bd1fc0b2893c14393524ea6d15f42a7033dd63e1e619deea163f51c930efd1c184cb9f008e19a5bf30557db5ed89303d6f9c5cf20132a103bf5f5c39

  • SSDEEP

    3072:0TLDOZizCUrIa2ccTxgwqllxYWekY5Xtw5BX88z5sK2zJ6FWDPUn:0TnOZi+O7kxq1YWRYjAX8S1uJ6AIn

Malware Config

Extracted

Family

warzonerat

C2

efiigbo9.duckdns.org:8800

Targets

    • Target

      INQ-985346.exe

    • Size

      199KB

    • MD5

      40e702eaa9702c15ec7a56dbabb1c11d

    • SHA1

      02759ef192241650b9a46dbc0ed417103fd0ea42

    • SHA256

      e092e65f8deb9ad553bfd53c0d46608c6f41850f0b5398e87a6a68dab7fd3bbb

    • SHA512

      1673247f354d3bbea422374db61178de80b34f0c4949972cf35050e013b7ef393043c6bafcfdc968b53389b401e82c0281d390c43e3123dc26955ceb33b40b7b

    • SSDEEP

      3072:lMP7eRyM+kMLdTx67/XOY4zFrdUibCewEsMqfk1ZOobfxAsXDq9m:lMPSd+DLaDwNd7enMqWBpW

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks